Your files and analysis reports will be visible to anyone after processing. To keep your reports and files privately 🔓 Choose Plan
You can use Wireshark sniffer or other pcap tools to prepare .pcap files. Choose network adapter to capture packets and click "Capture". See details about installation and packets capturing on Wireshark FAQ.
You can use tcpdump (a data-network packet analyzer) to collect network packets on a selected interface. tcpdump has various protocols filters to adjust collected packets, see options on tcpdump main page. Just run as superuser:
# tcpdump -i eth0 -w mycap.pcap
or use Wireshark sniffer.
# chmod 644 mycap.pcap
After pcap analysis will be finished you can follow a generated link to find a full report or just go to View Pcaps report section for public files. Reports for pcap files that uploaded privately (see plans and pricing) you can find in your personal files.
The report contains network protocol analysis, found files in HTTP stream and pcap visualization of network devices - see all features. Other information like WiFi associating process, transferred binaries and HTTP headers also are in the full report.
These files are mainly used in analyzing the network characteristics of a certain data. These files also contribute to successfully controlling traffic of a certain network since they are being monitored by the program. The data and the results of the network analysis are saved using the .pcap file extension which is why they are called .pcap files. Details ...